{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:57:46Z","timestamp":1753887466187,"version":"3.41.2"},"reference-count":47,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T00:00:00Z","timestamp":1619136000000},"content-version":"vor","delay-in-days":112,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71701115"],"award-info":[{"award-number":["71701115"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2017MF058"],"award-info":[{"award-number":["ZR2017MF058"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>To effectively identify network rumors and block their spread, this paper uses fractal theory to analyze a network rumor spreading situation time series, reveal its inner regularity, extract features, and establish a network rumor recognition model. The model is based on an empirical mode decomposition (EMD) correlation dimension and K\u2010nearest neighbor (KNN) approach. Firstly, a partition function is used to determine if the time series of the rumor spreading situation is a uniform fractal process. Secondly, the rumor spreading situation is subjected to EMD to obtain a series of intrinsic mode functions (IMFs), construct the IMF1\u2013IMF6 components containing effective feature information as the principal components, and reconstruct the phase space of the principal components, respectively. Finally, the correlation dimensions of the principal components IMF1\u2013IMF6 as obtained by the Grassberger\u2010Procaccia algorithm are used as feature parameters and are imported into the KNN model for rumor recognition. The experimental results show that the correlation dimension of a spreading situation can better reflect the characteristic information; as combined with the KNN model for identifying rumors, the recognition rate reaches 87.5%. This result verifies the effectiveness of fractal theory in network rumors recognition, expands the thinking for the research of rumors recognition, and provides theoretical support for rumor governance.<\/jats:p>","DOI":"10.1155\/2021\/5541987","type":"journal-article","created":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T23:35:52Z","timestamp":1619220952000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Rumor Situation Discrimination Based on Empirical Mode Decomposition Correlation Dimension"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7916-5507","authenticated-orcid":false,"given":"Yanwen","family":"Xin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8643-9572","authenticated-orcid":false,"given":"Fengming","family":"Liu","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,4,23]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"crossref","unstructured":"CastilloC. MendozaM. andPobleteB. Information credibility on twitter Proceedings of the 20th International Conference on World Wide Web ACM April 2011 New York NY USA 675\u2013684.","DOI":"10.1145\/1963405.1963500"},{"key":"e_1_2_9_2_2","unstructured":"QazvinianV. RosengrenE. RadevD. R. andMeiQ. Rumor has it: identifying misinformation in microblogs Proceedings of the 2011 Conference on Empirical Methods in Natural Language Processing July 2011 Association for Computational Linguistics Edinburgh UK) 1589\u20131599."},{"key":"e_1_2_9_3_2","doi-asserted-by":"crossref","unstructured":"YangF. LiuY. YuX. andYangM. Automatic detection of rumor on Sina Weibo Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics August 2012 Beijing China ACM 13.","DOI":"10.1145\/2350190.2350203"},{"key":"e_1_2_9_4_2","doi-asserted-by":"crossref","unstructured":"SunS. LiuH. HeJ. andDuX. Detecting event rumors on sina weibo automatically Proceedings of the Asia-Pacific Web Conference November 2013 Berlin Germany Springer 120\u2013131.","DOI":"10.1007\/978-3-642-37401-2_14"},{"key":"e_1_2_9_5_2","doi-asserted-by":"crossref","unstructured":"ZhangQ. ZhangS. DongJ. XiongJ. andChengX. Automatic Detection of Rumor on Social Network Proceedings of the Natural Language Processing And Chinese Computing 2015 Berlin Germany Springer 113\u2013122.","DOI":"10.1007\/978-3-319-25207-0_10"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2016.2517458"},{"key":"e_1_2_9_7_2","doi-asserted-by":"crossref","unstructured":"ZhaoZ. ResnickP. andMeiQ. Enquiring minds: early detection of rumors in social media from enquiry posts Proceedings of the International World Wide Web Conferences Steering Committee May 2015 Geneva; Switzerland 1395\u20131405.","DOI":"10.1145\/2736277.2741637"},{"key":"e_1_2_9_8_2","doi-asserted-by":"crossref","unstructured":"KwonS. ChaM. JungK. ChenW. andWangY. Prominent features of rumor propagation in online social media Proceedings of the 2013 IEEE 13th International Conference Data Mining December 2013 New York NY USA IEEE 1103\u20131108.","DOI":"10.1109\/ICDM.2013.61"},{"key":"e_1_2_9_9_2","doi-asserted-by":"crossref","unstructured":"MaJ. GaoW. WeiZ. LuY. andWongK.-F. Detect rumors using time series of social context information on microblogging websites Proceedings of the 24th ACM International Conference Information Knowledge Management December 2015 New York NY USA ACM 1751\u20131754.","DOI":"10.1145\/2806416.2806607"},{"key":"e_1_2_9_10_2","doi-asserted-by":"crossref","unstructured":"LiuX. NourbakhshA. LiQ. FangR. andShahS. Real-time rumor debunking on twitter Proceedings of the 24th ACM Int. Conf. Information Knowledge Management September 2015 New York NY USA ACM 1867\u20131870.","DOI":"10.1145\/2806416.2806651"},{"key":"e_1_2_9_11_2","doi-asserted-by":"crossref","unstructured":"MaJ. GaoW. WeiZ. andWongK.-F. Detect rumors in microblog posts using propagation structure via kernel learning Proceedings of the 55th Annual Meeting Of the Association For Comput. Linguistics August 2017 Vancouver Canada ACL 708\u2013717.","DOI":"10.18653\/v1\/P17-1066"},{"key":"e_1_2_9_12_2","doi-asserted-by":"crossref","unstructured":"LiuY. JinX. ShenH. andChengX. Do rumors diffuse differently from Non-rumors? A systematically empirical analysis in Sina Weibo for rumor identification Proceedings of the Pacific-asia Conference Knowledge Discovery and Data Mining July 2017 Berlin Germany Springer 407\u2013420.","DOI":"10.1007\/978-3-319-57454-7_32"},{"key":"e_1_2_9_13_2","unstructured":"RuchanskyN. SeoS. LiuY. and\u201cC. S. I. A hybrid deep model for fake news detection Proceedings of the 2017 ACM Conference Information And Knowledge Management December 2017 Singapore Association for Computing Machinery 797\u2013806."},{"key":"e_1_2_9_14_2","unstructured":"ZhangJ. CuiL. FuY. andGouzaF. 2018 Fake News Detection with Deep Diffusive Network Model."},{"key":"e_1_2_9_15_2","doi-asserted-by":"crossref","unstructured":"ShuK. WangS. andLiuH. Beyond News Contents: the role of social context for fake news detection Proceedings of the 12th ACM International Conference. Web Search And Data Mining February 2019 Melbourne Australia 312\u2013320.","DOI":"10.1145\/3289600.3290994"},{"key":"e_1_2_9_16_2","doi-asserted-by":"crossref","unstructured":"WangD.andYueX. The weighted multiple meta-models stacking method for regression problem Proceedings of the 38th Chinese Control Conference July 2019 Guangzhou China 29\u201334.","DOI":"10.23919\/ChiCC.2019.8865869"},{"key":"e_1_2_9_17_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/9352153"},{"key":"e_1_2_9_18_2","doi-asserted-by":"crossref","unstructured":"JinF. DoughertyE. SarafP. CaoY. andRamakrishnanN. Epidemiological modeling of news and rumors on Twitter Proceedings of the 7th Workshop On Social Network Mining And Analysis August 2013 Chicago Illinois ACM 1\u20139.","DOI":"10.1145\/2501025.2501027"},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2005.08.083"},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2016.2612980"},{"key":"e_1_2_9_21_2","unstructured":"MaJ. GaoW. MitraP.et al. Detecting rumors from microblogs with recurrent neural networks Proceedings of the 25th International Joint Conference On Artificial Intelligence 2016 New York NY USA AAAI Press 3818\u20133824."},{"key":"e_1_2_9_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2017.11.009"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2018.11.003"},{"key":"e_1_2_9_24_2","doi-asserted-by":"crossref","unstructured":"ChenT. LiX. YinH. andZhangJ. Call attention to rumors: deep attention based recurrent neural networks for early rumor detection Proceedings of the 11th International Workshop On Semantic Evaluation 2017 Vancouver Canada 40\u201352.","DOI":"10.1007\/978-3-030-04503-6_4"},{"key":"e_1_2_9_25_2","doi-asserted-by":"crossref","unstructured":"ChenY. LiuZ. andKaoH. IKM at SemEval-2017 task 8: convolutional neural networks for stance detection and rumor verification Proceedings of the 11th International Workshop On Semantic Evaluation 2017 Vancouver Canada 465\u2013469.","DOI":"10.18653\/v1\/S17-2081"},{"key":"e_1_2_9_26_2","doi-asserted-by":"publisher","DOI":"10.4018\/ijswis.2019100105"},{"key":"e_1_2_9_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106724"},{"key":"e_1_2_9_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/tim.2020.2983233"},{"key":"e_1_2_9_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.enconman.2020.113661"},{"key":"e_1_2_9_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.3030792"},{"key":"e_1_2_9_31_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.156.3775.636"},{"key":"e_1_2_9_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(88)90081-4"},{"key":"e_1_2_9_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.08.140"},{"key":"e_1_2_9_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3609-8"},{"key":"e_1_2_9_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2020.106772"},{"key":"e_1_2_9_36_2","doi-asserted-by":"publisher","DOI":"10.1080\/00051144.2019.1578037"},{"key":"e_1_2_9_37_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218348X19500270"},{"key":"e_1_2_9_38_2","doi-asserted-by":"publisher","DOI":"10.3788\/gzxb20194802.0206001"},{"key":"e_1_2_9_39_2","doi-asserted-by":"publisher","DOI":"10.15388\/NA.2019.5.1"},{"key":"e_1_2_9_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1427-x"},{"key":"e_1_2_9_41_2","doi-asserted-by":"crossref","unstructured":"ChenX. LiJ. andHanH. Signal subtle feature extraction algorithm based on improved fractal box-counting dimension Proceedings of the Conf. Cloud Computing And Security (ICCCS) June 2018 Haikou China 684\u2013696.","DOI":"10.1007\/978-3-030-00021-9_61"},{"key":"e_1_2_9_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-0923-6_50"},{"key":"e_1_2_9_43_2","doi-asserted-by":"publisher","DOI":"10.1142\/s0218348x13500114"},{"key":"e_1_2_9_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/s0378-4371(00)00606-3"},{"key":"e_1_2_9_45_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2014.12.001"},{"key":"e_1_2_9_46_2","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1998.0193"},{"key":"e_1_2_9_47_2","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(83)90298-1"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/5541987.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/5541987.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/5541987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T22:49:00Z","timestamp":1723243740000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/5541987"}},"subtitle":[],"editor":[{"given":"Nishant","family":"Malik","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/5541987"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5541987","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-02-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-16","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5541987"}}